نتایج جستجو برای: some have questioned the validity of contract

تعداد نتایج: 22841440  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد شاهرود - دانشکده علوم انسانی 1393

recent studies in scientific education as well as foreign and second language instruction suggest that thinking has rarely been an integral part of education and training in classroom. some scholars decried the lack of emphasis on thinking in the institutes and schools. they noted that memorization and drills were rewarded,while inquiry, reflection, and consideration of alternatives were frowne...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده کشاورزی 1394

with the increasing population and the need for more food, as well as with the development of science and technology, human approach to unnatural and often chemical inputs to increase agricultural production has been a great expansion and problems such as increased cancers, chronic diseases has created environmental pollution. implementation of organic organic is a solution to these problems . ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده کشاورزی 1390

abstract previous researches have shown success of growth hormones usage on flower production increase, pod and prevention of abscission of them in some of the pulses. two tests were done, in order to find out the effects of growth hormones to on flower production increase, pod and chick pea yield composites in farmer conditions (2010-11) and green house conditions as factorial on the proje...

پایان نامه :دانشگاه آزاد اسلامی واحد کرمانشاه - پژوهشکده زبان و گویش 1393

abstract the purpose of this study is twofold: on the one hand, it is intended to see what kind of noticing-the –gap activity (teacher generated vs. learner generated) is more efficient in teaching l2 grammar in classroom language learning. on the other hand, it is an attempt to determine which approach of the noticing-the-gap- activity is more effective in the long- term retention of grammar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

abstract although music possesses some kind of power and using it has been welcome by many students in language classrooms, it seems that they take a non-serious image of the lesson while listening to songs and they may think that it is a matter of fun. the main objective of the present study was to investigate whether learning a foreign language through musical texts (songs) can have an impac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - پژوهشکده ادبیات 1392

abstract the aim of the present study is to explore the impact of the cognitive reading strategy instruction on learners reading self-efficacy and their reading achievement. in order to fulfill this purpose, from 120 participants, 90 intermediate efl learners as an experimental group were chosen from three different educational settings namely, yazd university, yazd science and art un...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده ادبیات 1390

in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید